ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • The Evolving Role of CISOs and their Importance to the Business

    Sponsored by: F5 Networks

    Explore this 67 page Ponemon Institute Security Report to gain insight into the evolution and influence of CISOs through interviews with 184 companies regarding insights, challenges and approaches to security in today's global threat landscape.

  • ROI Analysis: IBM BigFix Patch And BigFix Compliance

    Sponsored by: IBM

    This Forrester report examines the potential ROI enterprises may gain by deploying IBM's BigFix Patch and BigFix Compliance. Uncover the security and cost benefits users saw with this implementation through real examples and experiences.

  • DDoS: Strategies for Dealing With a Growing Threat

    Sponsored by: A10 Networks

    In 2015, 10% of average DDoS attacks were above 50 Gbps. Today the average size of attacks greater than 50 Gbps quadrupled to 42%. This IDG paper provides research on recent DDoS attacks and compares the data to a similar study conducted a few years ago to discover what measures organizations need to take now to prevent the attacks.

  • Managed Detection and Response Service

    Sponsored by: Rapid 7

    According to the 2017 SANS Incident Response Survey, 87% responded to at least one incident in the past year. Take a look at this webcast to gain insight into improving your incident response strategy by validating and identifying known and unknown threats in order to protect your company.

  • Case Study: Incident Response Time Savings and Compliance Ease

    Sponsored by: Rapid 7

    This case study explores how energy provider, Energie Suedbayern (ESB), overcame its challenges of having limited IT staff resources, a growing compliance burden, and numerous threats from hackers. Uncover how ESB overcame these issues by bringing vulnerability management together with an incident detection response strategy.

  • Achieve SIEM Solution Success

    Sponsored by: Rapid 7

    Looking to unify data, detect attacks, and identify risks across your organization? SIEM can help. This white paper offers 6 challenges Gartner has identified as the main causes behind failed SIEM deployments and suggests an approach to implementing a successful SIEM platform while keeping these challenges in mind.

  • Journey to GDPR

    Sponsored by: IBM

    GDPR readiness is critical and a business necessity, but many organizations are struggling with the complex compliance requirements. This article provides information regarding GDPR as well as strategies to ensure you are compliant with the data processing rules.

  • The Evolving Risk Landscape

    Sponsored by: F5 Networks

    There was nearly a 22% increase in attacks on web applications from 2016 to 2017. While apps have increased productivity, they have also opened the door to unprecedented threats, expanding the risk landscape and putting corporate data at risk. This e-book offers a guide to protecting against web fraud, credential stuffing, ransomware, and phishing.

  • Damage Control: The Impact of Critical IT Incidents

    Sponsored by: Splunk

    IT incidents result in annual costs running into millions of dollars, while the average organization is dealing with hundreds of incidents every week. This Quocirca research report analyzes the impact critical IT incidents have on organizations, which halt business processes and impact users.

  • Get Ahead of GDPR Demands

    Sponsored by: IBM

    The GDPR financial penalties for non-compliance are daunting; learn how to gain GDPR compliance by keeping your company's data secure. This article provides insight into preparing for the GDPR by accelerating compliance readiness and managing data breaches.

  • The Hunt for IoT

    Sponsored by: F5 Networks

    30.6 million IoT brute force attacks were launched from January 1 to June 30 2017, according to F5 Labs. This report provides an analysis of data collected pertaining to the rise of thingbots in Europe, specifically focusing on the Mirai and Persirai bots containing destructive malware.

  • Cybersecurity: For Defenders, It's About Time

    Sponsored by: McAfee, Inc.

    In multiple areas of cybersecurity, time is working in favor of the attackers. This Aberdeen Group report provides 4 examples of how recapturing an advantage of time can help defenders reduce their risk.

  • Magic Quadrant for Enterprise Data Loss Prevention

    Sponsored by: McAfee, Inc.

    According to Gartner, by 2020, 85% of organizations will implement at least one form of integrated DLP, up from 50% today. This Gartner Magic Quadrant report reveals strengths and cautions of different vendor's DLP products as well as, a market overview.

  • How Malware Can Steal Your Data

    Sponsored by: F5 Networks

    51% of data breaches include malware, according to Verizon's 2017 Data Breach Investigations Report. This e-book provides insight into how malware can steal your data and offers strategies you use to prevent it from happening.

  • Busting the Myth of the Malware "Silver Bullet"

    Sponsored by: McAfee, Inc.

    Malware is continuing to evolve, and the next generation of it is requiring us to adopt next-level defenses. Unfortunately, there is no "silver bullet" to protect you from the lurking malware-wolf. Access this white paper to learn how to create a layered defense with complimentary tools that work in unison to fight malware threats.

  • Top Cyber Threats to the Technology Sector

    Sponsored by: Digital Shadows

    Technology providers collect sensitive customer data, causing them to be popular targets for cyberattacks. Explore this white paper to learn about the top 4 threats facing technology companies today, and learn from recent attacks to ensure your data is secured.

  • GDPR Quick Start Guide

    Sponsored by: MarkLogic

    According to an Osterman Research Report, 64% of organizations are not ready to comply with the GDPR. This paper offers a quick start to GDPR with 3 key steps that will put you on the right track to maintaining GDPR compliance.

  • Top Cyber Threats to The Retail Sector

    Sponsored by: Digital Shadows

    Given the frequent number of transactions taking place using payment cards, retail companies are frequently the target of financially-motivated threats. Explore this white paper to uncover the top 3 cyber threats to the retail sector to help you monitor and manage digital risks.

  • The Pressing Need for Digital Risk Management

    Sponsored by: Digital Shadows

    According to ESG research, 69% of organizations are increasing their cybersecurity budgets. This ESP report reveals how CISOs and risk officers can adopt a thorough risk management strategy to protect their enterprise from pressing cyber threats.

  • Demystifying Cloud Security

    Sponsored by: Workday

    Enterprises deploy more applications to more endpoints than ever before, making them great targets for hackers. Take a look at this white paper to gain insight into how shifting to the cloud can protect your company's increasing applications and endpoints.

  • Top Cyber Threats to the Legal Sector

    Sponsored by: Digital Shadows

    Legal firms can be attractive targets for cybercriminals, especially firms working on mergers and acquisitions (M&A), possessing a large amount of sensitive, non-public information. This paper highlights 3 security risks for legal firms to focus on and how to mitigate them.

  • Top Cybercrime Threats to Financial Institutions

    Sponsored by: Digital Shadows

    The most prevalent cybercrime threats against financial institutions are: the use or sale of ATM malware, targeted network intrusions, data breaches and the use of banking Trojans. Take a look at this white paper to learn more about these financial threats that stem from cybercriminals.

  • Protect Your Customer and Employee Accounts

    Sponsored by: Digital Shadows

    Digital Shadows found that 97% of the largest companies in the world had their credentials exposed. Explore this white paper to learn how to mitigate the growing risks of account takeovers and the measures you can take to ensure your organization is better protected.

  • How Can Privileged Access Accounts Be Managed in Large Companies?

    Sponsored by: One Identity

    According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.

  • How can organizations get control over privileged identity management?

    Sponsored by: One Identity

    Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.